for Android™ DEX

CrackProof™ for Android™ Award-Winning Record

About CrackProof™ for Android™ DEX

CrackProof™ for Android DEX™ is security software for anti-tampering processing of any Android apps (.dex files) that have been developed using Java. Java is widely used in the development of Android apps. While developing with Java is easy, Java is also easy to decompile, which presents major problems in terms of security. CrackProof™ for Android DEX™ offers applications strong protection from damage due to cracking, such as conversion to malware or bypassing license certification.
Since the anti-tampering processing is completed simply by a drag-and-drop of a target app for security processing, it is possible to introduce security measures without putting extra burden on application developers.

Introduction Example

 Bank  Household appliances manufacturer  Security equipment manufacturer
 News media  Car-navigation manufacturer  game manufacturer, etc

Portal sites / Others

 Google Play  Amazon application stores  dmenu(docomo)
 au Portal (au)  mobage  AppStore(Apple)  Preinstall to tablets

Security Functions

Function types  functions Explanation
Static Analysis
Prevention Functions
Dex(Java) File Tampering Prevention Prevents tampering with dex (Java) files. In case a dex (Java) file is tampered, the program will not start.
Signature Tampering Prevention Prevents tampering with a signature of package files(.apk).
Configuration File Modification Prevention Detects modification of package configuration files(.apk).
Odex File Tampering Prevention Prevents tampering with odex files installed on a device. It is effective as a countermeasure against a cracking method that invalidates billing information.
Dynamic Analysis
Prevention Functions
Debugger Prevention Prevents analysis by debuggers* while the program is running.
*the following debuggers[ Debugger for Java (DDMS) , Native debugger (gdb/gdbserver, etc) ]
Memory Access Prevention Prevents access to memory
Emulator Prevention Prevents a program from running on emulators. If the Android SDK emulator is detected, the program will not start. It is effective as a countermeasure against cracking methods to extract memory by executing a program on the emulator.
USB Debugging Prevention Prevents a program from running on devices with USB Debugging enabled.If a device with USB Debugging enabled is detected, the program will not start.
Execution environment
checking function
Rooting Prevention Prevents a program from running on devices modified to allow root access. The program will not start when its execution is detected on rooted devices. It is effective as a countermeasure against cracking methods used on rooted devices.

Processable File Format

APK file ( A processing target file is DEX file.)
* It is not possible to make anti-tampering processing of a shared object (.so) with CrackProof™ for Android DEX. Please contact us if you are developing an application using shared objects (.so).
*CrackProof™ is not available for Multi DEX.
The abovementioned contents including functions may be changed without a notice.

Operation Procedures

Preprocessing by Obfuscation (recommended)


* Although preprocessing is not essential, we recommend to take this as security can become stronger.

How to Use


1.Upload files to the Cloud


2.Security processing in the cloud


3.Download files

1.Upload files to the Cloud

Access to CrackProof cloud server with a web browser and upload apk file.

2.Security processing in the Cloud

CrackProof makes the apk file tamper-resistant automatically in the cloud.

3.Download files

Download the tamper-resistant apk files.
That’s it!!

Operating Environment

Required environment to run a hardened program (Android devices)

OS Android
Verison 4.0 or later
Important Notes:

*1 A hardened program will not operate on an operating environment if it is not supported by us.
* 2 We will correspond to a new OS after obtaining devices equipped with the new OS. (Free of charge)However, if there are significant architectural changes, the new OS may not be supported.
* 3 A hardened program is not compatible with Native Activity.
* 4 A hardened program is compatible with multi core CPU.

Introduction Flow

We will take the following Steps.
1.Explanation on our product / Interview on summary of your consideration →2.Conclusion of Non-disclosure Agreement →3.Interview on details of your consideration →4.Submission of a quotation →5.Trial use of the product*(2 weeks) →6.Placement of order and conclusion of Software Product License Agreement →7.Start formal operation of CrackProof™

*Customer will be asked to provide their application to be hardened to HyperTech, which will be returned to the customer after HyperTech hardens it

Introduction Cost

The introduction cost will be estimated individually, depending upon the release form and the number of applications to be hardened.

Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions.
The contents of this page are partially duplication of contents produced and provided by Google which are used following to the conditions stipulated in the 3.0 display license of the Creative Commons.


for Android™ DEXに関するサポート情報

Under construction.

Contact Us